2021-09-26 00:46:24,005 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2021-09-26 00:46:28,096 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.2.4.RELEASE) 2021-09-26 00:46:30.989  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default 2021-09-26 00:46:44.300 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2021-09-26 00:46:45.388  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2021-09-26 00:46:46.094  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2021-09-26 00:46:57.603  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 36.196 seconds (JVM running for 43.001) 2021-09-26 00:47:40.200  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-09-26 00:47:40.210 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-09-26 00:47:40.317 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-09-26 00:47:40.320 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-26 00:47:40.398  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2021-09-26 00:47:40.401  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-09-26 00:47:40.402  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-09-26 00:47:40.404 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-09-26 00:47:40.405 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-26 00:47:40.488 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-09-26 00:47:40.499 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-09-26 00:47:40.589 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-09-26 00:47:40.797 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-09-26 00:47:40.801 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-26 00:47:40.802 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-26 00:47:40.889 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-26 00:47:42.506  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-09-26 00:47:42.589  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-09-26 00:47:42.591 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-09-26 00:47:42.593 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-26 00:47:42.600  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-09-26 00:47:42.601  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-09-26 00:47:42.687 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-26 00:47:42.688 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-26 00:47:42.689 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-26 00:47:42.803 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-26 00:47:42.804 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-26 00:47:42.805 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-26 00:47:42.897 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-26 00:47:42.898 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-26 00:47:42.899 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-26 00:47:42.901 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-26 00:47:43.014 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 420967840869876995977796531969586489177759731851 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Sep 26 00:43:00 UTC 2021 Final Date: Fri Sep 26 00:42:59 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [dc:f6:5b:60:fd:91:6a:8e:9e:aa:59:05:03:31:1f:25:86:dd:66:ed] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 997abfac69db8bdf035fc31411517c472a5e46d9 ba8c81c48336c7166497e1d994980d4c795e1645 8cda8aa5965f70b57958d62786d478bb7c7e6d42 d9f87a223732987465824286b09e21afda63d957 7d272d5f9d5fa0c7fc7b74647fe5ebbeae376bf5 e1339766b9766d5c8181a3bf3b555b8461020cdb 0b1225653d84a33f3b143045b79c1e32655d4cb3 0bc35161c03a61af9f0de5b1188548b64eebcb97 eda22f42a56659d73e9d0c2ea073aae36e059dfe 449d19d3dd4b49840436eed47e197bfb2db41b18 eeae30bc94d1d6fd4b863227377d86f2eaedbba1 9c0f8745b6042aa6c17e47cd1ad1c6a787f830d8 b44de321b86c5919ab8f5e0b8070cc6482cfb77e 7564c3f361a9448a3919b060c4f21dc6d68b261a b560ca3410879c43df161d93c35d5d9a37892dab 79c9b2011cbccdee4085a0ae3515f90b00ff3bb5 c2d8625f4b1c27057fc3242c7eb48b4be197bc18 1f14b9c900b6d892c1d2128d013309fd17db7d56 94d985cafa009e3860a1b7b11b05cc0ca076e7c4 866e66c2 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [65:52:08:0e:36:42:51:fb:96:fb:de:e4:99:e9:2c:f3:65:0d:67:06] modulus: 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 public exponent: 10001 ] 2021-09-26 04:06:41.411  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-09-26 04:06:41.413 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-09-26 04:06:41.415 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2021-09-26 04:06:41.487 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-26 04:06:41.489  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2021-09-26 04:06:41.491  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-09-26 04:06:41.492  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-09-26 04:06:41.493 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-09-26 04:06:41.493 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-09-26 04:06:41.494 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-09-26 04:06:41.504 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-09-26 04:06:41.505 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-26 04:06:41.505 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-26 04:06:41.505 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-26 04:06:41.728  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-09-26 04:06:41.729  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-09-26 04:06:41.730 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-09-26 04:06:41.730 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-26 04:06:41.735  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-09-26 04:06:41.735  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-09-26 04:06:41.787 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-26 04:06:41.787 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-26 04:06:41.788 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-26 04:06:41.789 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-26 04:06:41.790 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-26 04:06:41.790 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-26 04:06:41.792 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-26 04:06:41.792 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-26 04:06:41.793 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-26 04:06:41.794 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-26 04:06:41.798 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 420967840869876995977796531969586489177759731851 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Sep 26 00:43:00 UTC 2021 Final Date: Fri Sep 26 00:42:59 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [dc:f6:5b:60:fd:91:6a:8e:9e:aa:59:05:03:31:1f:25:86:dd:66:ed] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 997abfac69db8bdf035fc31411517c472a5e46d9 ba8c81c48336c7166497e1d994980d4c795e1645 8cda8aa5965f70b57958d62786d478bb7c7e6d42 d9f87a223732987465824286b09e21afda63d957 7d272d5f9d5fa0c7fc7b74647fe5ebbeae376bf5 e1339766b9766d5c8181a3bf3b555b8461020cdb 0b1225653d84a33f3b143045b79c1e32655d4cb3 0bc35161c03a61af9f0de5b1188548b64eebcb97 eda22f42a56659d73e9d0c2ea073aae36e059dfe 449d19d3dd4b49840436eed47e197bfb2db41b18 eeae30bc94d1d6fd4b863227377d86f2eaedbba1 9c0f8745b6042aa6c17e47cd1ad1c6a787f830d8 b44de321b86c5919ab8f5e0b8070cc6482cfb77e 7564c3f361a9448a3919b060c4f21dc6d68b261a b560ca3410879c43df161d93c35d5d9a37892dab 79c9b2011cbccdee4085a0ae3515f90b00ff3bb5 c2d8625f4b1c27057fc3242c7eb48b4be197bc18 1f14b9c900b6d892c1d2128d013309fd17db7d56 94d985cafa009e3860a1b7b11b05cc0ca076e7c4 866e66c2 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [85:4b:de:2c:b5:c1:7f:88:4a:3d:db:b8:ab:e5:42:ec:ec:a3:a0:38] modulus: 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 public exponent: 10001 ] 2021-09-26 04:08:51.619  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-09-26 04:08:51.621 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-09-26 04:08:51.622 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-09-26 04:08:51.623 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-26 04:08:51.624  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-09-26 04:08:51.625  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-09-26 04:08:51.625  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-09-26 04:08:51.625 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-09-26 04:08:51.626 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-09-26 04:08:51.626 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-09-26 04:08:51.630 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-09-26 04:08:51.630 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-26 04:08:51.631 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-26 04:08:51.631 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-26 04:08:51.786  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-09-26 04:08:51.787  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-09-26 04:08:51.788 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-09-26 04:08:51.789 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-26 04:08:51.790  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-09-26 04:08:51.791  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-09-26 04:08:51.791 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-26 04:08:51.792 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-26 04:08:51.792 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-26 04:08:51.792 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-26 04:08:51.793 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-26 04:08:51.793 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-26 04:08:51.794 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-26 04:08:51.794 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-26 04:08:51.794 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-26 04:08:51.795 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-26 04:08:51.797 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 420967840869876995977796531969586489177759731851 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Sep 26 00:43:00 UTC 2021 Final Date: Fri Sep 26 00:42:59 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [dc:f6:5b:60:fd:91:6a:8e:9e:aa:59:05:03:31:1f:25:86:dd:66:ed] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 997abfac69db8bdf035fc31411517c472a5e46d9 ba8c81c48336c7166497e1d994980d4c795e1645 8cda8aa5965f70b57958d62786d478bb7c7e6d42 d9f87a223732987465824286b09e21afda63d957 7d272d5f9d5fa0c7fc7b74647fe5ebbeae376bf5 e1339766b9766d5c8181a3bf3b555b8461020cdb 0b1225653d84a33f3b143045b79c1e32655d4cb3 0bc35161c03a61af9f0de5b1188548b64eebcb97 eda22f42a56659d73e9d0c2ea073aae36e059dfe 449d19d3dd4b49840436eed47e197bfb2db41b18 eeae30bc94d1d6fd4b863227377d86f2eaedbba1 9c0f8745b6042aa6c17e47cd1ad1c6a787f830d8 b44de321b86c5919ab8f5e0b8070cc6482cfb77e 7564c3f361a9448a3919b060c4f21dc6d68b261a b560ca3410879c43df161d93c35d5d9a37892dab 79c9b2011cbccdee4085a0ae3515f90b00ff3bb5 c2d8625f4b1c27057fc3242c7eb48b4be197bc18 1f14b9c900b6d892c1d2128d013309fd17db7d56 94d985cafa009e3860a1b7b11b05cc0ca076e7c4 866e66c2 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [82:d0:7f:25:01:0e:98:55:0e:5e:b9:a2:69:ad:69:62:16:18:c0:e0] modulus: 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 public exponent: 10001 ] 2021-09-26 04:10:42.301  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-09-26 04:10:42.302 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-09-26 04:10:42.303 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-09-26 04:10:42.304 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-26 04:10:42.305  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-09-26 04:10:42.305  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-09-26 04:10:42.305  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-09-26 04:10:42.305 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-09-26 04:10:42.306 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-09-26 04:10:42.306 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-09-26 04:10:42.310 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-09-26 04:10:42.310 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-26 04:10:42.310 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-26 04:10:42.310 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-26 04:10:42.400  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-09-26 04:10:42.401  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-09-26 04:10:42.402 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-09-26 04:10:42.402 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-26 04:10:42.405  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-09-26 04:10:42.406  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-09-26 04:10:42.406 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-26 04:10:42.407 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-26 04:10:42.407 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-26 04:10:42.408 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-26 04:10:42.409 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-26 04:10:42.409 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-26 04:10:42.410 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-26 04:10:42.410 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-26 04:10:42.410 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-26 04:10:42.411 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-26 04:10:42.413 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 420967840869876995977796531969586489177759731851 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Sep 26 00:43:00 UTC 2021 Final Date: Fri Sep 26 00:42:59 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [dc:f6:5b:60:fd:91:6a:8e:9e:aa:59:05:03:31:1f:25:86:dd:66:ed] modulus: dc5993942d142c8cf9106b3c197b73cbf0cb7dc04bd77b270239ac322c0367192e8ff52070908eaeedf221f0781f7f78fa397e307cddd111b5dda7fa51d588ef5ea412c347b029a830e5e33d1e92f30fdc6d00568d1f1627b8ddee32c2e2105b488f220fad8e654286aa33edbe64810ed7b19e189b04cec2acb096be752b49fce56d11294f8de3696790e6e1344794d34e2cd5a9eb5182d516d9b98dca9e0145171817e5d4ac749e91f759d5ca11c4856f1daff8b6acff7e8c315b9df5e1519a1d1b8db26492df6fa541995dbfd80fe13b8297d0b32ab930aff8774e6a115a2e45fdbbc6c17824693fd0c7d6636ab1931b87659444e47ef6eb0b53132156f738c370151da2f89ffc587363b3e4c19e08b7b29a20a8972f684a01ea11bb44524d290dcc5bb5c2411d916643f7268e69d0264a62bf4a7bd70775a9ab5cb5c3eb8aba7fbe846b896e84cb6d40ccdb8544ca0b57513801256098ef98490da7aac0875e84c05623c39672ef2e7f0425cb23522bb295b2d7b1ac6fd10bc2da7a3d1ce1 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 997abfac69db8bdf035fc31411517c472a5e46d9 ba8c81c48336c7166497e1d994980d4c795e1645 8cda8aa5965f70b57958d62786d478bb7c7e6d42 d9f87a223732987465824286b09e21afda63d957 7d272d5f9d5fa0c7fc7b74647fe5ebbeae376bf5 e1339766b9766d5c8181a3bf3b555b8461020cdb 0b1225653d84a33f3b143045b79c1e32655d4cb3 0bc35161c03a61af9f0de5b1188548b64eebcb97 eda22f42a56659d73e9d0c2ea073aae36e059dfe 449d19d3dd4b49840436eed47e197bfb2db41b18 eeae30bc94d1d6fd4b863227377d86f2eaedbba1 9c0f8745b6042aa6c17e47cd1ad1c6a787f830d8 b44de321b86c5919ab8f5e0b8070cc6482cfb77e 7564c3f361a9448a3919b060c4f21dc6d68b261a b560ca3410879c43df161d93c35d5d9a37892dab 79c9b2011cbccdee4085a0ae3515f90b00ff3bb5 c2d8625f4b1c27057fc3242c7eb48b4be197bc18 1f14b9c900b6d892c1d2128d013309fd17db7d56 94d985cafa009e3860a1b7b11b05cc0ca076e7c4 866e66c2 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [53:31:79:26:90:07:86:71:c6:23:ea:0e:40:d5:bb:9b:f0:14:7b:b5] modulus: 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 public exponent: 10001 ] 2021-09-26 04:10:54.902  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-09-26 04:10:54.904 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-09-26 04:10:54.906 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-09-26 04:10:54.907 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-26 04:10:54.908  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-for-bulkpm-over-https }, SANs: [dcae-ves-collector-for-bulkpm-over-https, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2021-09-26 04:10:54.988  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-09-26 04:10:54.989  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-09-26 04:10:54.989 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-09-26 04:10:54.990 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-09-26 04:10:54.990 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-09-26 04:10:54.996 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-09-26 04:10:54.997 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-26 04:10:54.997 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-26 04:10:54.997 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-26 04:10:55.090  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-09-26 04:10:55.091  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-09-26 04:10:55.091 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-09-26 04:10:55.092 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-26 04:10:55.093  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-09-26 04:10:55.093  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-09-26 04:10:55.093 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-26 04:10:55.094 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-26 04:10:55.094 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-26 04:10:55.095 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-26 04:10:55.095 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-26 04:10:55.095 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-26 04:10:55.096 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-26 04:10:55.096 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-26 04:10:55.096 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-26 04:10:55.097 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-for-bulkpm-over-https,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-26 04:10:55.099 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 420967840869876995977796531969586489177759731851 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Sep 26 00:43:00 UTC 2021 Final Date: Fri Sep 26 00:42:59 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [dc:f6:5b:60:fd:91:6a:8e:9e:aa:59:05:03:31:1f:25:86:dd:66:ed] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 997abfac69db8bdf035fc31411517c472a5e46d9 ba8c81c48336c7166497e1d994980d4c795e1645 8cda8aa5965f70b57958d62786d478bb7c7e6d42 d9f87a223732987465824286b09e21afda63d957 7d272d5f9d5fa0c7fc7b74647fe5ebbeae376bf5 e1339766b9766d5c8181a3bf3b555b8461020cdb 0b1225653d84a33f3b143045b79c1e32655d4cb3 0bc35161c03a61af9f0de5b1188548b64eebcb97 eda22f42a56659d73e9d0c2ea073aae36e059dfe 449d19d3dd4b49840436eed47e197bfb2db41b18 eeae30bc94d1d6fd4b863227377d86f2eaedbba1 9c0f8745b6042aa6c17e47cd1ad1c6a787f830d8 b44de321b86c5919ab8f5e0b8070cc6482cfb77e 7564c3f361a9448a3919b060c4f21dc6d68b261a b560ca3410879c43df161d93c35d5d9a37892dab 79c9b2011cbccdee4085a0ae3515f90b00ff3bb5 c2d8625f4b1c27057fc3242c7eb48b4be197bc18 1f14b9c900b6d892c1d2128d013309fd17db7d56 94d985cafa009e3860a1b7b11b05cc0ca076e7c4 866e66c2 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [1f:31:91:09:0e:f8:96:f1:fe:c7:d3:5c:4f:3f:4f:cc:f2:ce:75:fe] modulus: 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 public exponent: 10001 ] 2021-09-26 04:11:27.389  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-09-26 04:11:27.390 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-09-26 04:11:27.391 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2021-09-26 04:11:27.391 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-26 04:11:27.391  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [https-server] } 2021-09-26 04:11:27.392  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-09-26 04:11:27.392  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-09-26 04:11:27.392 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-09-26 04:11:27.392 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-09-26 04:11:27.392 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-09-26 04:11:27.396 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-09-26 04:11:27.396 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-26 04:11:27.396 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-26 04:11:27.396 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-26 04:11:27.470  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-09-26 04:11:27.471  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-09-26 04:11:27.486 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-09-26 04:11:27.487 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-26 04:11:27.488  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-09-26 04:11:27.488  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-09-26 04:11:27.489 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-26 04:11:27.489 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-26 04:11:27.489 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-26 04:11:27.490 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-26 04:11:27.490 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-26 04:11:27.490 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-26 04:11:27.491 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-26 04:11:27.491 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-26 04:11:27.491 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-26 04:11:27.491 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-26 04:11:27.493 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 420967840869876995977796531969586489177759731851 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Sep 26 00:43:00 UTC 2021 Final Date: Fri Sep 26 00:42:59 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [dc:f6:5b:60:fd:91:6a:8e:9e:aa:59:05:03:31:1f:25:86:dd:66:ed] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 997abfac69db8bdf035fc31411517c472a5e46d9 ba8c81c48336c7166497e1d994980d4c795e1645 8cda8aa5965f70b57958d62786d478bb7c7e6d42 d9f87a223732987465824286b09e21afda63d957 7d272d5f9d5fa0c7fc7b74647fe5ebbeae376bf5 e1339766b9766d5c8181a3bf3b555b8461020cdb 0b1225653d84a33f3b143045b79c1e32655d4cb3 0bc35161c03a61af9f0de5b1188548b64eebcb97 eda22f42a56659d73e9d0c2ea073aae36e059dfe 449d19d3dd4b49840436eed47e197bfb2db41b18 eeae30bc94d1d6fd4b863227377d86f2eaedbba1 9c0f8745b6042aa6c17e47cd1ad1c6a787f830d8 b44de321b86c5919ab8f5e0b8070cc6482cfb77e 7564c3f361a9448a3919b060c4f21dc6d68b261a b560ca3410879c43df161d93c35d5d9a37892dab 79c9b2011cbccdee4085a0ae3515f90b00ff3bb5 c2d8625f4b1c27057fc3242c7eb48b4be197bc18 1f14b9c900b6d892c1d2128d013309fd17db7d56 94d985cafa009e3860a1b7b11b05cc0ca076e7c4 866e66c2 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [39:50:5e:45:73:8e:a4:e4:4e:08:b0:fc:dc:07:ee:34:07:24:e8:10] modulus: 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 public exponent: 10001 ] 2021-09-26 04:11:59.979  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-09-26 04:11:59.980 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-09-26 04:11:59.981 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2021-09-26 04:11:59.982 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-26 04:11:59.983  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=https-server }, SANs: [wrong-cert] } 2021-09-26 04:11:59.983  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-09-26 04:11:59.984  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-09-26 04:11:59.984 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-09-26 04:11:59.984 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-09-26 04:11:59.985 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-09-26 04:11:59.989 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-09-26 04:11:59.989 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-26 04:11:59.990 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-26 04:11:59.990 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-26 04:12:00.086  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-09-26 04:12:00.087  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-09-26 04:12:00.087 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-09-26 04:12:00.087 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-26 04:12:00.088  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-09-26 04:12:00.088  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-09-26 04:12:00.088 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-26 04:12:00.089 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-26 04:12:00.089 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-26 04:12:00.089 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-26 04:12:00.089 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-26 04:12:00.089 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-26 04:12:00.090 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-26 04:12:00.090 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-26 04:12:00.090 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-26 04:12:00.091 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=https-server,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-26 04:12:00.093 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 420967840869876995977796531969586489177759731851 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Sep 26 00:43:00 UTC 2021 Final Date: Fri Sep 26 00:42:59 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [dc:f6:5b:60:fd:91:6a:8e:9e:aa:59:05:03:31:1f:25:86:dd:66:ed] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 997abfac69db8bdf035fc31411517c472a5e46d9 ba8c81c48336c7166497e1d994980d4c795e1645 8cda8aa5965f70b57958d62786d478bb7c7e6d42 d9f87a223732987465824286b09e21afda63d957 7d272d5f9d5fa0c7fc7b74647fe5ebbeae376bf5 e1339766b9766d5c8181a3bf3b555b8461020cdb 0b1225653d84a33f3b143045b79c1e32655d4cb3 0bc35161c03a61af9f0de5b1188548b64eebcb97 eda22f42a56659d73e9d0c2ea073aae36e059dfe 449d19d3dd4b49840436eed47e197bfb2db41b18 eeae30bc94d1d6fd4b863227377d86f2eaedbba1 9c0f8745b6042aa6c17e47cd1ad1c6a787f830d8 b44de321b86c5919ab8f5e0b8070cc6482cfb77e 7564c3f361a9448a3919b060c4f21dc6d68b261a b560ca3410879c43df161d93c35d5d9a37892dab 79c9b2011cbccdee4085a0ae3515f90b00ff3bb5 c2d8625f4b1c27057fc3242c7eb48b4be197bc18 1f14b9c900b6d892c1d2128d013309fd17db7d56 94d985cafa009e3860a1b7b11b05cc0ca076e7c4 866e66c2 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [58:4a:96:5b:be:dc:e5:fe:0d:ba:22:dd:8a:73:e1:35:ed:cb:ad:36] modulus: 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 public exponent: 10001 ] 2021-09-26 04:13:14.120  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-09-26 04:13:14.122 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-09-26 04:13:14.123 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-09-26 04:13:14.123 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-26 04:13:14.123  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert-wrong-sans }, SANs: [wrong-sans] } 2021-09-26 04:13:14.124  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-09-26 04:13:14.124  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-09-26 04:13:14.124 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-09-26 04:13:14.124 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-09-26 04:13:14.124 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-09-26 04:13:14.127 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-09-26 04:13:14.128 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-26 04:13:14.128 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-26 04:13:14.128 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-26 04:13:14.211  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-09-26 04:13:14.212  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-09-26 04:13:14.212 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-09-26 04:13:14.213 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-26 04:13:14.215  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-09-26 04:13:14.215  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-09-26 04:13:14.216 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-26 04:13:14.217 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-26 04:13:14.217 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-26 04:13:14.218 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-26 04:13:14.219 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-26 04:13:14.219 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-26 04:13:14.220 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-26 04:13:14.221 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-26 04:13:14.221 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-26 04:13:14.221 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert-wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-26 04:13:14.286 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 420967840869876995977796531969586489177759731851 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Sep 26 00:43:00 UTC 2021 Final Date: Fri Sep 26 00:42:59 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [dc:f6:5b:60:fd:91:6a:8e:9e:aa:59:05:03:31:1f:25:86:dd:66:ed] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 997abfac69db8bdf035fc31411517c472a5e46d9 ba8c81c48336c7166497e1d994980d4c795e1645 8cda8aa5965f70b57958d62786d478bb7c7e6d42 d9f87a223732987465824286b09e21afda63d957 7d272d5f9d5fa0c7fc7b74647fe5ebbeae376bf5 e1339766b9766d5c8181a3bf3b555b8461020cdb 0b1225653d84a33f3b143045b79c1e32655d4cb3 0bc35161c03a61af9f0de5b1188548b64eebcb97 eda22f42a56659d73e9d0c2ea073aae36e059dfe 449d19d3dd4b49840436eed47e197bfb2db41b18 eeae30bc94d1d6fd4b863227377d86f2eaedbba1 9c0f8745b6042aa6c17e47cd1ad1c6a787f830d8 b44de321b86c5919ab8f5e0b8070cc6482cfb77e 7564c3f361a9448a3919b060c4f21dc6d68b261a b560ca3410879c43df161d93c35d5d9a37892dab 79c9b2011cbccdee4085a0ae3515f90b00ff3bb5 c2d8625f4b1c27057fc3242c7eb48b4be197bc18 1f14b9c900b6d892c1d2128d013309fd17db7d56 94d985cafa009e3860a1b7b11b05cc0ca076e7c4 866e66c2 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [eb:a2:e6:db:57:07:a4:db:63:a6:dc:b4:f7:ae:c9:76:e7:bb:8b:91] modulus: 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 public exponent: 10001 ] 2021-09-26 04:13:45.601  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2021-09-26 04:13:45.602 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2021-09-26 04:13:45.602 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-09-26 04:13:45.603 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2021-09-26 04:13:45.603  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2021-09-26 04:13:45.603  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2021-09-26 04:13:45.603  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2021-09-26 04:13:45.604 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2021-09-26 04:13:45.604 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2021-09-26 04:13:45.604 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2021-09-26 04:13:45.607 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2021-09-26 04:13:45.607 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-26 04:13:45.607 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2021-09-26 04:13:45.608 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-26 04:13:45.687  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2021-09-26 04:13:45.688  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2021-09-26 04:13:45.689 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2021-09-26 04:13:45.689 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2021-09-26 04:13:45.691  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2021-09-26 04:13:45.691  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2021-09-26 04:13:45.692 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-26 04:13:45.692 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-26 04:13:45.692 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-26 04:13:45.693 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-26 04:13:45.693 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-26 04:13:45.694 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-26 04:13:45.694 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2021-09-26 04:13:45.695 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2021-09-26 04:13:45.695 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2021-09-26 04:13:45.696 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2021-09-26 04:13:45.700 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 420967840869876995977796531969586489177759731851 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Sep 26 00:43:00 UTC 2021 Final Date: Fri Sep 26 00:42:59 UTC 2031 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [dc:f6:5b:60:fd:91:6a:8e:9e:aa:59:05:03:31:1f:25:86:dd:66:ed] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 997abfac69db8bdf035fc31411517c472a5e46d9 ba8c81c48336c7166497e1d994980d4c795e1645 8cda8aa5965f70b57958d62786d478bb7c7e6d42 d9f87a223732987465824286b09e21afda63d957 7d272d5f9d5fa0c7fc7b74647fe5ebbeae376bf5 e1339766b9766d5c8181a3bf3b555b8461020cdb 0b1225653d84a33f3b143045b79c1e32655d4cb3 0bc35161c03a61af9f0de5b1188548b64eebcb97 eda22f42a56659d73e9d0c2ea073aae36e059dfe 449d19d3dd4b49840436eed47e197bfb2db41b18 eeae30bc94d1d6fd4b863227377d86f2eaedbba1 9c0f8745b6042aa6c17e47cd1ad1c6a787f830d8 b44de321b86c5919ab8f5e0b8070cc6482cfb77e 7564c3f361a9448a3919b060c4f21dc6d68b261a b560ca3410879c43df161d93c35d5d9a37892dab 79c9b2011cbccdee4085a0ae3515f90b00ff3bb5 c2d8625f4b1c27057fc3242c7eb48b4be197bc18 1f14b9c900b6d892c1d2128d013309fd17db7d56 94d985cafa009e3860a1b7b11b05cc0ca076e7c4 866e66c2 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [6f:f9:2a:68:b7:2f:b0:05:75:e9:5c:ba:cd:5f:a1:45:44:41:a0:2e] modulus: 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 public exponent: 10001 ]